Alyssa Fung Kyung Yi Brian Patullo
Introduction Background of cloud computing implementation Cloud technology Fundamental problems of cloud computing Security issue Lack of knowledge
Cloud Security Implementation Corporations and cloud computing Up-to-date security implementation Example of cloud computing implementation
Bypassing Cloud Computing/Security Creation of virtual machines Attacks on virtual machines Malicious virtual machine attack Denial-of-service attack A keystroke attack
Bypassing Cloud Computing/Security Google and its cloud system security Easy access into servers for users and hackers (single sign-on) Attack on Google’s cloud system Phishing attack
Cloud Security & Accounting Scope of cloud audit Cloud service provider OR cloud service client Assess and evaluate risks of cloud computing changes in company’s operating environment Internal controls Assess and evaluate risks of cloud computing to auditors
Conclusion Cloud computing as a result of change in traditional connectivity models Understanding and minimizing risks associated with cloud computing Future in cloud computing